Secure Password Transmission for Web Applications over Internet using Cryptography and Image Steganography

被引:7
|
作者
Hussain, Mehdi [1 ,2 ]
Wahab, Ainuddin Wahid Abdul [1 ]
Batool, Ishrat [3 ]
Arif, Muhammad [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
[2] NUST, Sch Elect Engn & Comp Sci, Islamabad, Pakistan
[3] Fdn Univ, Lahore, Pakistan
关键词
Secure password transmission; secure authentication using Image; Steganography and Cryptography; Password over unsecure network;
D O I
10.14257/ijsia.2015.9.2.17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The significance of digital information security has been enhanced due to the boost of Internet communication. Providing security for server client communication over the Internet is a critical issue due to open world digital eavesdroppers. Generally, password authentication is required for establishing a connection between server and client environment. The client password is verified by the server ends to establish a valid connection. Successful password verification initiates the client and server to perform further secured request and response mechanisms. The problem of password authentication over insecure networks presents in many application areas, such as web login, remote logins of computer networks. Hence the significance of confidential password transmission over insecure Internet becomes the necessity of secure authentication. In this paper, we proposed a secure password transmission over the Internet for authentication of server/client environment using encryption and image steganography. Client password is first encrypted and embedded in an image using steganographic algorithm at client side and transmitted over unsecured network to the web server. On the other side server extract safely password from image steganography decoding algorithm, decrypt and verified it's with SQL database server. In case if the intruder steals the image over network he/she will be unable to decode the password from the image. The prototype of the proposed method is implemented using JavaScript, Html, and ASP.net for verification purpose.
引用
收藏
页码:179 / 188
页数:10
相关论文
共 50 条
  • [41] Secure Data Transmission Scheme Based on Elliptic Curve Cryptography for Internet of Things
    Harbi, Yasmine
    Aliouat, Zibouda
    Harous, Saad
    Bentaleb, Abdelhak
    MODELLING AND IMPLEMENTATION OF COMPLEX SYSTEMS, 2019, 64 : 34 - 46
  • [42] Secure communication over wireless sensor network using image steganography with generative adversarial networks
    Ambika
    Virupakshappa
    Veerashetty, Sachinkumar
    Measurement: Sensors, 2022, 24
  • [43] Cryptography and Bioinformatics techniques for Secure Information transmission over Insecure Channels
    Siddaramappa, V
    Ramesh, K. B.
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 137 - 139
  • [44] Security Enhancement in Image Steganography Using Neural Networks and Visual Cryptography
    Seethalakshmi, K. S.
    Usha, B. A.
    Sangeetha, K. N.
    2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 396 - 402
  • [45] Visual Cryptography and Image Steganography using Space Filling Hilbert Curves
    Sheidaeian, Hamed
    Abbasifard, Mohammad Reza
    Zolfaghari, Behrouz
    4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING ( ICACTE 2011), 2011, : 763 - 767
  • [46] Image security using steganography and cryptography with sweeping computational ghost imaging
    Rajabi-Ghaleh, Sajjad
    Olyaeefar, Babak
    Kheradmand, Reza
    Ahmadi-Kandjani, Sohrab
    FRONTIERS IN PHYSICS, 2024, 12
  • [47] Secret information hiding in image randomly method using steganography and cryptography
    Hammoud, Awad Kadhim
    Mohaisen, Hatem Nahi
    Mohammed, Mohammed Q.
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2021, 12 : 1283 - 1291
  • [48] A modified LSB image steganography method using filtering algorithm and stream of password
    Islam, M. R.
    Tanni, T. R.
    Parvin, S.
    Sultana, M. J.
    Siddiqa, A.
    INFORMATION SECURITY JOURNAL, 2021, 30 (06): : 359 - 370
  • [49] Secure transmission of medical records using high capacity steganography
    Srinivasan, Y
    Nutter, B
    Mitra, S
    Phillips, B
    Ferris, D
    17TH IEEE SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS, PROCEEDINGS, 2004, : 122 - 127
  • [50] Secure Transmission of Medical Information Using IRIS Recognition and Steganography
    Barkathunisha, S.
    Meenakumari, R.
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON COMPUTATION OF POWER, ENERGY, INFORMATION AND COMMUNICATION (ICCPEIC 2013), 2013, : 89 - 92